DEEPER KNOWLEDGE. ADVANCED SECURITY.

Similar documents
Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

Strengthening Capacity in Cyber Talent sans.org/cybertalent

CompTIA Cybersecurity Analyst+

The fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS

A United States Cyber Academy Program

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed.

Building new cybersecurity pipelines. NICE Conference 2017 November 8, Strengthening Cyber Workforce Development sans.

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Balancing Compliance and Operational Security Demands. Nov 2015 Steve Winterfeld

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

CCISO Blueprint v1. EC-Council

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Advanced Diploma on Information Security

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline

CSWAE Certified Secure Web Application Engineer

CCNA Cybersecurity Operations 1.1 Scope and Sequence

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

CCNA Cybersecurity Operations. Program Overview

Training for the cyber professionals of tomorrow

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

CERTIFICATION TRAINING - ISC2

Certified Ethical Hacker (CEH)

Playing Security Poker I match your degree and raise you by a certification or 2 Grumpy Old Security Men What s up Cert?

Advanced Ethical Hacking & Penetration Testing. Ethical Hacking

Certified Cyber Security Analyst VS-1160

CPTE: Certified Penetration Testing Engineer

Keeping Your SOCs Full. May 26, Strengthening Capacity in Cyber Talent sans.org/cybertalent

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

E-guide Getting your CISSP Certification

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

SANS/REN-ISAC Partnership

IE156: ICS410: ICS/SCADA Security Essentials

LONDON SUMMER 2016 SAT 9 SAT 16 JULY, 2016 #SANSLONDON. 14 SANS COURSES SEC566 Implementing and Auditing the Critical Security Controls- In Depth

CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001)

CIT 480: Securing Computer Systems. Putting It All Together

01/02/2014 SECURITY ASSESSMENT METHODOLOGIES SENSEPOST 2014 ALL RIGHTS RESERVED

locuz.com SOC Services

Security. Protect your business from security threats with Pearl Technology. The Connection That Matters Most

Staffing Services UnderDefense your source of experienced professionals to solve security staffing challenges today

Cyber Security & Ethical Hacking Training. Introduction to Cyber Security Introduction to Cyber Security. Linux Operating System and Networking: LINUX

DIS10.1 Ethical Hacking and Countermeasures

Ingram Micro Cyber Security Portfolio

BLACK HAT USA 2013 ADD A CLASS REQUEST FORM INSTRUCTIONS

EC-Council Certified Incident Handler v2. Prepare to Handle and Respond to Security Incidents EC-COUNCIL CERTIFIED INCIDENT HANDLER 1

Altius IT Policy Collection

Pluralsight CEU-Eligible Courses for CompTIA Network+ updated March 2018

FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY

Immersion Academy Annual Report 2018

Security+ SY0-501 Study Guide Table of Contents

Education Network Security

Leadership. 25 years leading in cyber. 165,000 trained since ,000+ students annually

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

Certified Secure Web Application Engineer

to Enhance Your Cyber Security Needs

Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI)

BUILDING AND MAINTAINING SOC

6 MILLION AVERAGE PAY. CYBER Security. How many cyber security professionals will be added in 2019? for popular indursty positions are

CALENDAR FOR THE YEAR 2018

Penetration testing.

UPDATED: 10/17/16. Senior Level. Senior Specialty Threat, Consultant, Engineer, Manager. Mid Level Analyst

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security

"Charting the Course to Your Success!" Securing.Net Web Applications Lifecycle Course Summary

ISDP 2018 Industry Skill Development Program In association with

CompTIA Security+ Pre-approved Training for CompTIA Security+ Continuing Education Units (CEUs)

ISSMP is in compliance with the stringent requirements of ANSI/ISO/IEC Standard

CND Exam Blueprint v2.0

Course 831 EC-Council Certified Ethical Hacker v10 (CEH)

Career Paths In Cybersecurity

Course 831 Certified Ethical Hacker v9

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

Apprenticeships CYBER SECURITY HIGHER APPRENTICESHIP FROM IT TECHNICIAN TO SKILLED INFORMATION SECURITY PROFESSIONAL

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

CEH: CERTIFIED ETHICAL HACKER v9

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Certified Cyber Security Specialist

ISC2. Exam Questions CISSP. Certified Information Systems Security Professional (CISSP) Version:Demo

COMPUTER TECHNOLOGY (COMT)

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

DIS10.3:CYBER FORENSICS AND INVESTIGATION

Cyber Security. Building and assuring defence in depth

Federal Virtual Training Environment (FedVTE) Pre-Approved for CompTIA CEUs

Course Outline Topic 1: Current State Assessment, Security Operations Centers, and Security Architecture

EC-Council - EC-Council Certified Security Analyst (ECSA) v8

Strengthening Cybersecurity Workforce Development December 2017

Hands-On Hacking Course Syllabus

Ethical Hacking and Prevention

Plenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m.

Web Application Penetration Testing

Security Solutions. Overview. Business Needs

When Recognition Matters WHITEPAPER CLFE CERTIFIED LEAD FORENSIC EXAMINER.

Operationalizing the Three Principles of Advanced Threat Detection

Software Development & Education Center Security+ Certification

Transcription:

DEEPER KNOWLEDGE. ADVANCED SECURITY. Global Information Assurance Certification (GIAC) develops and administers the premier certifications for information security professionals. More than 30 certifications align with SANS training and ensure mastery in critical, specialized InfoSec domains. GIAC certifications provide the highest and most rigorous assurance of cybersecurity knowledge and skill available to industry, government, and military clients across the world.

The most trusted source for information security training, certification and research. SANS Training SANS Training: Develops real-world knowledge and hands-on skills Certification GIAC Certifications: Assure the highest levels of job- specific knowledge Research SANS Research: Advancement of InfoSec theory and practice The highest standard in cybersecurity certification. Job-Specific, Specialized Focus Today s cyber attacks are highly sophisticated and exploit specific vulnerabilities. Broad, general InfoSec certifications are no longer enough. Professionals need specific skills and specialized knowledge to meet multiple, varied threats. GIAC offers more than 30 certifications. Each certification focuses on specific job skills and requires unmatched and distinct knowledge. Deep, Real-World Knowledge Theoretical knowledge is the ultimate security risk. Deep, technical, real-world knowledge and skills are the only reliable means to reduce security risk. SANS is the leader in providing training that builds practical knowledge, hands-on skills, and technical depth. A GIAC certification ensures mastery of real-world knowledge and skills. Most Trusted Certification Design The design of a certification exam can impact the quality and integrity of a certification. GIAC exam content and question design are developed through a rigorous process led by GIAC s on-staff psychometrician and reviewed by experts in each technical area. More than 80,000 certifications have been issued since 1999. GIAC certifications meet ANSI/ISO 17024 standards.

CYBER DEFENSE APPLICATION SECURITY MANAGEMENT LEGAL AND AUDIT PENETRATION TESTING DIGITAL FORENSICS CYBER DEFENSE The essential skills and techniques needed to protect and secure an organization s critical information assets, business systems, and industrial controls. SANS Training Courses: 18 GIAC Certifications: 10 PENETRATION TESTING The identification and assessment of potential attacks and vulnerabilities, and implementation of defenses and immediate responses to contain, mitigate, and remediate risks. SANS Training Courses: 13 GIAC Certifications: 7 DIGITAL FORENSICS The acquisition and examination of evidence from digital systems to find and recover known artifacts essential to information and systems security. SANS Training Courses: 8 GIAC Certifications: 5 APPLICATION SECURITY The design, development, and defense of secure application software and systems. SANS Training Courses: 6 GIAC Certifications: 3 MANAGEMENT, LEGAL AND AUDIT The leadership and management of security teams and risk analysis techniques to conduct a technical audit of essential information systems. SANS Training Courses: 14 GIAC Certifications: 6

Why Certification? Better Job Performance More than 50% of IT managers say their staff was significantly more effective or more effective on the job after certification. (IT SKills and Salary Report, Global Knowledge, 2012) More Hiring Potential U.S. Department of Defense Directive 8140 (8570) requires certification of all cybersecurity professionals. Cybersecurity jobs are 50% more likely to require certification than IT jobs. (2015 Burning Glass) GIAC Gold Status GSE: The Certification Like No Other Only the true security elite hold a GIAC Security Expert certification (GSE). For good reason. It s the most prestigious, most demanding certification in the information security industry. The GSE s performancebased, hands-on nature sets it apart from any other certification in the IT security industry. Those who earn the GSE master the wide variety of skills, across multiple domains, required by top security professionals. They demonstrate expertise in applying knowledge in a hands-on environment. GSEs are verified network packet ninjas with world-class incident response capabilities. In addition to superior technical skills, GSEs must have demonstrated a keen awareness of important business drivers and considerations, a skillset that is too rare among less seasoned technical personnel. GSE. For the very few, the very best, cybersecurity professionals. Today s cybersecurity leaders need both technical expertise and communication skills. Candidates work with an advisor to submit a peer-reviewed Gold Paper in their area of Information Security expertise. Approved papers are published in the SANS Reading Room for industry reference. DEEPER KNOWLEDGE. ADVANCED SECURITY.

GIAC Certification Portfolio GIAC Certification SANS Course Areas Covered CYBER DEFENSE * Information Security Fundamentals Security Essentials SEC301 Intro to Information Security SEC401 Security Essentials Information Security Foundations Cryptography Network Protection Strategies and Host Protection Prevention of attacks and detection of adversaries Networking Concepts, Defense in Depth, Secure Communications Foundational Windows and Linux Security Enterprise Defender SEC501 Advanced Security Essentials Defensive Network Infrastructure and Packet Analysis Pen Testing and Vulnerability Analysis and Mitigation Incident Response, Malware and Data Loss Prevention Perimeter Protection Analyst SEC502 Perimeter Protection Network Security, IP and Packet Decoding Endpoint-Host Security Logging Wireless, Encryption, VPNs and Cloud Intrusion Analyst SEC503 Intrusion Detection Fundamentals of Traffic Analysis and Application Protocols Open Source IDS: Snort and Bro Network Traffic Forensics and Monitoring Windows Security Administrator SEC505 Securing Windows and Powershell Automation Windows OS and Application Hardening PowerShell Scripting and Managing Cryptography Server Hardening, IPSec, Dynamic Access Control and DNS Unix Security Administrator SEC506 Securing Linux/Unix Hardening Linux/Unix Application Security in Depth Digital Forensics in the Linux/Unix Environment Continuous Monitoring SEC511 Continuous Monitoring Security Architecture and Security Operations Centers (SOCs) Network Security Architecture and Monitoring Endpoint Security Architecture, Automation and Continuous Monitoring Critical Controls SEC566 Critical Security Controls Overview of the Critical Controls and Asset Inventories Vulnerability Assessments and Remediation, Privileges, Logging Email and Browser Protections, Malware, Control of Network Access and Protocols, Data Protection and Recovery and Secure Configurations Wireless Device Control, Application Security, Incident Response, and Penetration Testing Global Industrial Cybersecurity Professional ICS410 ICS/SCADA Security Essentials Industrial Control Systems (ICS/SCADA) and Information Technology Defending ICS Devices, Workstations, Servers and Networks ICS/SCADA Security Governance *SANS training is not required for Certification Challenge

GIAC Certification SANS Course Areas Covered PENETRATION TESTING DIGITAL FORENSICS Incident Handler Penetration Tester Web Application Penetration Tester Python Coder Mobile Device Security Analyst Assessing and Auditing Wireless Networks Exploit Researcher and Advanced Penetration Tester Forensic Examiner Forensic Analyst SEC504 Hacker Tools and Incident Handling SEC560 Network Pen Testing SEC542 Web App Pen Testing SEC573 Python for Pen Testers SEC575 Mobile Device Security SEC617 Wireless Ethical Hacking and Pen Testing SEC660 Advanced Pen Testing FOR408 Windows Forensic Analysis FOR508 Advanced Digital Forensics Incident Handling and Computer Crime Investigation Computer and Network Hacker Exploits Hacker Tools (Nmap, Nessus, Metasploit and Netcat) Comphrehensive Pen Test Planning, Scoping and Recon In-Depth Scanning and Exploitation, Post-Exploitation and Pivoting In-Depth Password Attacks and Web App Pen Testing Web App Pen Testing and Ethical Hacking: Configuration, Identity and Authentication Injection, JavaScript, XSS, and SQL Injection CSRF, Logic Flaws and Tools (sqlmap, MetaSploit, and BeEF) Python Essentials: Variable and Math Operations, Strings and Functions and Compound Statements Data Structures and Programming Concepts, Debugging, System Arguments and ArgParcer Python Application Development for Pen Testing: Backdoors and SQL Injection Mobile Device Architecture and Common Threats (Android and ios) Platform Access, Application Analysis and Reverse Engineering Penetration Testing Mobile Devices: Probe Mapping, Enterprise and Network Attacks, Sidejacking, SSL/TLS Attacks, SQL and Side Injection Wireless Data Collection, WiFi MAC Analysis, and Wireless Tools (Kismet and Wireshark), Attacking WEP Client, Crypto and Enterprise Attacks Advanced WiFi Attacks: DoS Attacks, Fuzzing, Bridging the Airgap, Bluetooth, DECT and ZigBee Network Attacks, Crypto, Network Booting and Restricted Environments Python, Scapy and Fuzzing Exploiting Windows and Linux for Penetration Testers Windows Forensics and Data Triage Windows Registry Forensics, USB Devices, Shell Items, Key Word Searching, Email and Event Logs Web Browser Forensics (FireFox, IE and Chrome) and Tools (Nirsoft, Woanware, SQLite, ESEDatabaseView and Hindsight) Advanced Incident Response and Digital Forensics Memory Forensics, Timeline Analysis and Anti-Forensics Detection Threat Hunting and APT Intrusion Incident Response Network Forensic Analyst FOR572 Advanced Network Forensics Network Forensics in Depth: Web Proxy Servers, Payload Reconstruction, Packet Capture and Tools (tcpdump and Wireshark) NetFlow Analysis, Visualization, Network Protocols and Wireless Investigations Logging, OPSEC, Encryption, Protocol Reversing and Automation

GIAC Certification SANS Course Areas Covered Advanced Smartphone Forensics FOR585 Advanced Smartphone Forensics Smartphone Overview and Malware Forensics Android, ios and Blackberry Forensics Third-Party Applications and Other Devices (Windows, Nokia and Knock-Off Devices) Reverse Engineering Malware FOR610 Reverse Engineering Malware Malware Analysis and Malicious Code Fundamentals and Analysis In-Depth Malware Analysis and Tools (OllyDbg, Process Dumping Tools and Imports-Rebuilding Tools) Self-Defending Malware, Malicious Documents and Memory Forensics APPLICATION SECURITY MANAGEMENT, LEGAL AND AUDIT Web Application Defender Secure Software Programmer-Java Secure Software Programmer-.NET Information Security Professional Security Leadership Project Manager DEV522 Defending Web Applications DEV541 Securing Code in JAVA/JEE DEV544 Securing Code in.net MGT414 SANS Training for CISSP MGT512 Leadership Essentials MGT525 IT Project Management Web Application Architecture, Authentication and Authorization Vulnerabilities and Defense and Mitigation Proactive Defense and Operation Security, AJAX and Web Services Security Clickjacking, DNS Rebinding, Flash, Java, SSO and IPv6 Data Validation, Authentication and Session Management Java Platform and API Security Secure Development Lifecycle Data Validation, Authentication and Session Management.NET Framework Security Secure Development Lifecycle Security and Risk Management, Asset Security and Security Engineering, Communication and Network Security Identity and Access Management, Security Assessment and Security Operations Software Development Security Managing the Enterprise, Planning, Network and Physical Plant IP Concepts, Attacks Against the Enterprise and Defense-in- Depth Secure Communications (Cryptography, Wireless, Steganography, Web and OPSEC), Intellectual Property, Incident Handling, Disaster Recovery/Planning and Risk Management Project Management Structure and Framework Time and Cost Management, Communications and Human Resources Quality and Risk Management, Procurement, Stakeholder Management and Project Integration Law of Data Security & Investigations LEG523 Law of Data Security IT Security Law and Policy, E-Records, E-Discovery and Business Law Contracting for Data Security (Sarbanes-Oxley, Gramm-Leach- Bliley, HIPPA, EU Data Directive and Data Breach Notice Laws) IT Compliance and How to Conduct Investigations and Crisis Management Systems and Network Auditor AUD507 Auditing and Monitoring Networks Auditing, Risk Assessments and Reporting Network and Perimeter Auditing/Monitoring, and Web Application Auditing Auditing and Monitoring in Windows and Unix Environments

HELPING INDIVIDUALS AND ORGANIZATIONS MASTER CYBERSECURITY Cybersecurity Awareness Securing The Human for organizations that need to improve cybersecurity throughout their organization. CyberTalent Sourcing SANS CyberTalent for organizations in need of trained and certified cybersecurity experts. I think the exam was both fair and practical. These are the kind of realworld problems I expect to see in the field. Carl Hallberg, GREM, Wells Fargo GIAC made the testing process much better than other organizations. The material is spot on with what I do at work, daily. Jason Pfister, GMON, EWEB It feels like SANS and GIAC are working with the candidates to help them to meet the required standards, which are achievable with hard work. Thomas Gurney, GCIA It s an awesome effort: great questions, excellent material and presentation throughout the (training event) week. I ve really enjoyed it and will recommend it to many. Thank you GIAC/SANS! Nicholas B., GCIH, Intrasys Interactive Learning Hands-on cyber range learning with a focus on mastering the skills that information security professionals can use in their jobs every day. Advanced Degrees SANS Technology Institute for IT professionals seeking to advance their career by focusing on cybersecurity leadership and management. DEEPER KNOWLEDGE. ADVANCED SECURITY. INFO@GIAC.ORG WWW.GIAC.ORG Summer 2016